Data-oriented exploits are growing in popularity as defenders are closing attack vectorsrelated to control flow exploits. Data Oriented Programming (DOP), a generalization of data-oriented attacks,stitches together data-oriented gadgets and can perform Turing-complete computations in memory. Besides,data-oriented exploits modify the behavior of the program without violating its control flow, andtherefore cannot be stopped by ubiquitous control flow mitigations such as Data Execution Prevention (DEP),Address Space Layout Randomization (ASLR) and Control Flow Integrity (CFI).A unified solution cannot address all memory corruption errors as there are different classes of memory corruptionerrors and each of them requires careful considerations....